ISO 27001 Clause 7.5.2 Creating and Updating Documented Information

Home / ISO 27001 Clauses / ISO 27001 Clause 7.5.2 Creating and Updating Documented Information

In this ultimate guide to ISO 27001:2022 Clause 7.5.2 Creating and Updating Documented Information you will learn

  • What ISO 27001 Clause 7.5.2 is
  • How to implement it
  • How to create and update documents
  • What documents you need

What is ISO 27001 Clause 7.5.2 ?

The ISO 27001 standard requires an organisation to document the information security management system, that the documentation is marked up with document markup and that documents are reviewed and approved.

It works on the premise that if it is not written down then it does not exist. Often the ISO 27001 certification is about the minutia of documentation rather than whether you are actually secure.

Unless you are buying an ISO 27001 Toolkit you are going to have a lot of ISO 27001 documents to create.

We are not here to defend it, rather to show you how to do it.

Hopefully saving you some time and money along the way.

As the ISO 27001 standard for ISO 27001 certification wants you to document pretty much everything and this approach, and how you do it, is very much in line with ISO 9001. It is one of the ISO 27001 controls.

Definition

The ISO 27001 Standard defines ISO 27001:2022 clause 7.5.2 as:

When creating and updating documented information the organisation shall ensure appropriate:
a) identification and description (e.g. a title, date, author, or reference number)
b) format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and
c) review and approval for suitability and adequacy.

ISO 27001:2022 Clause ISO 27001 Clause 7.5.2 Creating and Updating Documented Information

What are the ISO 27001:2022 Changes to Clause 7.5.2?

Great news. There are no changes to ISO 27001 Clause 7.5.2 in the 2022 update.

Implementation Guide

There are many ways to document your information security management system. Some are more efficient and proven than others.

Our ISO 27001 toolkit has been built over 20 years and is used globally by thousands of businesses who want to save vast amounts of time and money.

You may be considering an Information Security Management System online solution. These software solutions can be a great help to information security managers in larger organisations but they come at a massive cost.

Which ever route you go .. document everything.

And make sure it is marked up appropriately.

Choose your document format

The simplest format for creating your documents is going to be Microsoft Office. It provides the most flexibility and the most options for exporting in different formats such as PDF. You can use any format you like, for example Google Docs, but decide up front what format your documents will be in.

Build document templates

You will require document templates for each document type that you will create. This is typically Word processing, Spreadsheets, Presentations, Diagrams. We recommend creating a Microsoft Word template, a Microsoft Excel Template and a Microsoft Powerpoint template. Optionally considering buying the ISO 27001 Toolkit that includes all the documents that you need that fully this requirement for document mark up. If you create your own ISO 27001 document templates then the ISO 27001 document templates should include the following steps.

Add a title place holder

Every document requires a date so provide a place holder for the date the document was last amended in your document template.

Add an author place holder

Every document requires an author so provide a place holder for the author of the document in your ISO 27001 document template.

Optionally add a reference number place holder

Reference numbers are not required and are optional. If they make sense for you provide a place holder for the reference number of the document.

Add a version control table

Version control is very important in a document to show the history of that document. Include a version control table in your document template that has columns for the date of the change, how made the change, what change they made and the version number of the document. Include rows in the template as place holders that can be completed.

Add a last reviewed date place holder

The date of last review may be the date the document was last updated or it may not. A document may not need to be reviewed every-time it is up dated. Be sure to provide a place holder in your ISO 27001 document template for the date the document was last formally reviewed. It is good practice to provide evidence of the review and the easiest way to do this is have the document reviewed and signed off at the management review team meeting and then minuted in the meeting minutes.

Add a document confidentiality level place holder

The classification of documents is very important and covered under other clauses within the standard but now is a good time to provide a place holder for the document classification. This will be used to apply the appropriate level of controls to the document.

Use the ISO 27001 document templates to create your actual documents

Use the templates that you have created as a baseline to create your information security management system documents, policies and records of evidence. It is best practice to apply this mark up to all the documents that will be covered by the scope of your ISO 27001 certification. The auditor will check.

Before you get audited

Check, double check and recheck your documentation before you get audited. The documentation is the primary thing that you will be audited on. Make sure all your version controls are up to date, documents are clean of comments and review mark up, that they have appropriate approvals, appropriate document markup. Ensure that the version control has been touched at least once in the last 12 months before the audit happens.

Watch the Tutorial

Watch How To Implement ISO 27001 Clause 7.5.2 Creating and Updating Documented Information

How do you demonstrate compliance to ISO 27001 clause 7.5.2?

Having a documented information security management system, documented policies and document records of the effective operation of your processes will show you comply with ISO 27001 clause 7.5.2

But only if those document include the document mark up required and you can evidence the documents were reviewed and approved.

You need the appropriate document mark up and you need to ensure that they are updated at least within the last 12 months.

ISO 27001 Templates

ISO 27001 templates are a great way to implement your information security management system. Whilst an ISO 27001 toolkit can save you up to 30x in consulting fees and allow you to deliver up to 10x faster these individual templates help meet the specific requirements of ISO 27001 clause 7.5.2

ISO 27001 Toolkit

FAQ

What is ISO 27001 Clause 7.5.2 Creating and Updating Documented Information?

The ISO 27001 standard requires that documents have a prescribed mark up, are reviewed and approved. The mark up required includes:
a) Title
b) Date
c) Author
d) Version control
e) Document classification
f) Document last reviewed date
g) Document owner

How do I evidence I meet the requirement of ISO 27001 Clause 7.5.2 Creating and Updating Documented Information?

You evidence compliance to the ISO 27001 Clause 7.5.2 by having a good documentation in place that meets the document mark up requirements and is evidenced as being reviewed and approved within the last 12 months.

Where can I download ISO 27001 Clause 7.5.2 Creating and Updating Documented Information templates?

You can download ISO 27001 7.5.2 templates in the ISO 27001 Toolkit.

ISO 27001 Clause 7.5.2 Creating and Updating Documented Information example?

An example of ISO 27001 Clause 7.5.2 can be found in the ISO 27001 Toolkit.

Download a copy of an ISO 27001 documentation templates toolkit?

The ISO 27001 documentation templates toolkit can be downloaded in the ISO 27001 Toolkit.

Can the owner of a document approve the document?

Possibly. If the owner of the document did not make the changes that have been made then yes the document owner can approve the document. As long as the author of the change and the approver are distinct people.

How do you approve documents?

The easiest way to approve documents and evidence that they were approved is to share the documents at the next Management Review Team meeting seeking the sign off. Once agree to minute the decision in the meeting minutes.

ISO 27001 Toolkit Business Edition
Do it Yourself ISO 27001 with LIVE EXPERT SUPPORT

ISO 27001:2022 requirements

ISO 27001:2022 Annex A 5 - Organisational Controls

ISO 27001 Annex A 5.1 Policies for information security

ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3 Segregation of duties

ISO 27001 Annex A 5.4 Management responsibilities

ISO 27001 Annex A 5.5 Contact with authorities

ISO 27001 Annex A 5.6 Contact with special interest groups

ISO 27001 Annex A 5.7 Threat intelligence – new

ISO 27001 Annex A 5.8 Information security in project management

ISO 27001 Annex A 5.9 Inventory of information and other associated assets – change

ISO 27001 Annex A 5.10 Acceptable use of information and other associated assets – change

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.13 Labelling of information

ISO 27001 Annex A 5.14 Information transfer

ISO 27001 Annex A 5.15 Access control

ISO 27001 Annex A 5.16 Identity management

ISO 27001 Annex A 5.17 Authentication information – new

ISO 27001 Annex A 5.18 Access rights – change

ISO 27001 Annex A 5.19 Information security in supplier relationships

ISO 27001 Annex A 5.20 Addressing information security within supplier agreements

ISO 27001 Annex A 5.21 Managing information security in the ICT supply chain – new

ISO 27001 Annex A 5.22 Monitoring, review and change management of supplier services – change

ISO 27001 Annex A 5.23 Information security for use of cloud services – new

ISO 27001 Annex A 5.24 Information security incident management planning and preparation – change

ISO 27001 Annex A 5.25 Assessment and decision on information security events 

ISO 27001 Annex A 5.26 Response to information security incidents

ISO 27001 Annex A 5.27 Learning from information security incidents

ISO 27001 Annex A 5.28 Collection of evidence

ISO 27001 Annex A 5.29 Information security during disruption – change

ISO 27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32 Intellectual property rights

ISO 27001 Annex A 5.33 Protection of records

ISO 27001 Annex A 5.34 Privacy and protection of PII

ISO 27001 Annex A 5.35 Independent review of information security

ISO 27001 Annex A 5.36 Compliance with policies and standards for information security

ISO 27001 Annex A 5.37 Documented operating procedures 

ISO 27001:2022 Annex A 8 - Technology Controls

ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.4 Access To Source Code

ISO 27001 Annex A 8.5 Secure Authentication

ISO 27001 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9 Configuration Management 

ISO 27001 Annex A 8.10 Information Deletion

ISO 27001 Annex A 8.11 Data Masking

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.17 Clock Synchronisation

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001 Annex A 8.20 Network Security

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.23 Web Filtering

ISO 27001 Annex A 8.24 Use of CryptographyISO27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28 Secure Coding

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30 Outsourced Development

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 8.33 Test Information

ISO 27001 Annex A 8.34 Protection of information systems during audit testing